-
1
-
-
0344875575
-
Information hiding, anonymity and privacy: A modular approach
-
D. Hughes and V. Shmatikov, "Information hiding, anonymity and privacy: a modular approach," Journal of Computer Security, vol.12, no. 1, pp. 3-36, 2004.
-
(2004)
Journal of Computer Security
, vol.12
, Issue.1
, pp. 3-36
-
-
Hughes, D.1
Shmatikov, V.2
-
2
-
-
50249128197
-
An indistinguishability-based characterization of anonymous channels
-
Leuven, Belgium, July 23-25, Proceedings, Lecture Notes in Computer Science, N. Borisov and I. Goldberg, Eds. Springer
-
A. Hevia and D. Micciancio, "An indistinguishability-based characterization of anonymous channels," in Privacy Enhancing Technologies, 8th International Symposium, PETS 2008, Leuven, Belgium, July 23-25, 2008, Proceedings, ser. Lecture Notes in Computer Science, N. Borisov and I. Goldberg, Eds., vol.5134. Springer, pp. 24-43.
-
(2008)
Privacy Enhancing Technologies, 8th International Symposium, PETS 2008
, vol.5134
, pp. 24-43
-
-
Hevia, A.1
Micciancio, D.2
-
3
-
-
45949087897
-
On the fundamentals of anonymity metrics
-
ser. IFIP International Federation for Information Processing. Springer Science & Business Media
-
C. Andersson and R. Lundin, "On the fundamentals of anonymity metrics," in The Future of Identity in the Information Society, ser. IFIP International Federation for Information Processing. Springer Science & Business Media, 2008.
-
(2008)
The Future of Identity in the Information Society
-
-
Andersson, C.1
Lundin, R.2
-
4
-
-
33746594541
-
A framework for quantification of linkability within a privacy-enhancing identity management system
-
Emerging Trends in Information and Communication Security - International Conference, ETRICS 2006, Proceedings
-
S. Clauß, "A framework for quantification of linkability within a privacy-enhancing identity management system," in Emerging Trends in Information and Communication Security, International Conference, ETRICS 2006, Freiburg, Germany, June 6-9, 2006, Proceedings, ser. Lecture Notes in Computer Science, G. Müller, Ed., vol.3995. Springer Verlag, pp. 191-205. (Pubitemid 44156249)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3995
, pp. 191-205
-
-
Clauss, S.1
-
5
-
-
34547490882
-
Structuring anonymity metrics
-
DOI 10.1145/1179529.1179539, Proceedings of the Second ACM Workshop on Digital Identity Management, DIM 2006. Co-located with the 13th ACM Conference on Computer and Communications Security, CCS'06
-
S. Clauß and S. Schiffner, "Structuring anonymity metrics," in DIM '06: Proceedings of the second ACM workshop on Digital identity management. New York, NY, USA: ACM Press, 2006, pp. 55-62. (Pubitemid 47165645)
-
(2006)
Proceedings of the Second ACM Workshop on Digital Identity Management, DIM 2006. Co-located with the 13th ACM Conference on Computer and Communications Security, CCS'06
, pp. 55-62
-
-
Clauss, S.1
Schiffner, S.2
-
7
-
-
33746634961
-
Information theory and anonymity
-
B. Macq and J. Quisquater, Eds.
-
C. Díaz, J. Claessens, S. Seys, and B. Preneel, "Information theory and anonymity," in Proceedings of the 23rd Symposium on Information Theory in the Benelux, B. Macq and J. Quisquater, Eds., 2002, pp. 179- 186.
-
(2002)
Proceedings of the 23rd Symposium on Information Theory in the Benelux
, pp. 179-186
-
-
Díaz, C.1
Claessens, J.2
Seys, S.3
Preneel, B.4
-
8
-
-
84957800033
-
Towards Measuring Anonymity
-
Privacy Enhancing Technologies
-
C. D́1az, S. Seys, J. Claessens, and B. Preneel, "Towards measuring anonymity," in Privacy Enhancing Technologies, Second International Workshop, PET 2002, San Francisco, CA, USA, April 14-15, 2002, Revised Papers, ser. Lecture Notes in Computer Science, R. Dingledine and P. F. Syverson, Eds., no. 2482. Springer Verlag, Berlin, 2002, pp. 54-68. (Pubitemid 36309879)
-
(2003)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.2482
, pp. 54-68
-
-
Diaz, C.1
Seys, S.2
Claessens, J.3
Preneel, B.4
-
9
-
-
34748911762
-
A combinatorial approach to measuring anonymity
-
4258723, ISI 2007: 2007 IEEE Intelligence and Security Informatics
-
M. Edman, F. Sivrikaya, and B. Yener, "A combinatorial approach to measuring anonymity," in Proceedings of the 2007 IEEE International Conference on Intelligence and Security Informatics. IEEE, 2007. (Pubitemid 47469264)
-
(2007)
ISI 2007: 2007 IEEE Intelligence and Security Informatics
, pp. 357-364
-
-
Edman, M.1
Sivrikaya, F.2
Yener, B.3
-
10
-
-
38149112556
-
Attacking unlinkability: The importance of context
-
Canada, June 20-22, Revised Selected Papers, ser. Lecture Notes in Computer Science, N. Borisov and P. Golle, Eds, Springer Verlag, Berlin
-
M. Franz, B. Meyer, and A. Pashalidis, "Attacking unlinkability: The importance of context," in Privacy Enhancing Technologies, 7th International Symposium, PET 2007 Ottawa, Canada, June 20-22, 2007, Revised Selected Papers, ser. Lecture Notes in Computer Science, N. Borisov and P. Golle, Eds., vol.4776. Springer Verlag, Berlin, pp. 1-16.
-
(2007)
Privacy Enhancing Technologies, 7th International Symposium, PET 2007 Ottawa
, vol.4776
, pp. 1-16
-
-
Franz, M.1
Meyer, B.2
Pashalidis, A.3
-
11
-
-
33645976295
-
Linkability in Practical Electronic Cash Design
-
G. Maitland, J. Reid, E. Foo, C. Boyd, and E. Dawson, "Linkability in practical electronic cash design," in Information Security, Third International Workshop, ISW 2000, Wollongong, NSW, Australia, December 20-21, 2000, Proceedings, ser. Lecture Notes in Computer Science, J. Pieprzyk, E. Okamoto, and J. Seberry, Eds., vol.1975. Springer Verlag, pp. 149-163. (Pubitemid 33209754)
-
(2000)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.1975
, pp. 149-163
-
-
Maitland, G.1
Reid, J.2
Foo, E.3
Boyd, C.4
Dawson, E.5
-
12
-
-
84957802536
-
Towards an information theoretic metric for anonymity
-
San Francisco, CA, USA, April 14-15, Revised Papers, ser. Lecture Notes in Computer Science, R. Dingledine and P. F. Syverson, Eds. Springer Verlag, Berlin
-
A. Serjantov and G. Danezis, "Towards an information theoretic metric for anonymity," in Privacy Enhancing Technologies, Second International Workshop, PET 2002, San Francisco, CA, USA, April 14- 15, 2002, Revised Papers, ser. Lecture Notes in Computer Science, R. Dingledine and P. F. Syverson, Eds., vol.2482. Springer Verlag, Berlin, pp. 41-53.
-
(2002)
Privacy Enhancing Technologies, Second International Workshop, PET 2002
, vol.2482
, pp. 41-53
-
-
Serjantov, A.1
Danezis, G.2
-
13
-
-
84885205648
-
Measuring relationship anonymity in mix networks
-
New York, NY, USA: ACM Press
-
V. Shmatikov and M.-H. Wang, "Measuring relationship anonymity in mix networks," in WPES '06: Proceedings of the 5th ACM workshop on Privacy in electronic society. New York, NY, USA: ACM Press, 2006, pp. 59-62.
-
(2006)
WPES '06: Proceedings of the 5th ACM Workshop on Privacy in Electronic Society
, pp. 59-62
-
-
Shmatikov, V.1
Wang, M.-H.2
-
14
-
-
33845537887
-
Measuring anonymity revisited
-
S. Liimatainen and T. Virtanen, Eds., Espoo, Finland, November
-
G. Tóth, Z. Hornák, and F. Vajda, "Measuring anonymity revisited," in Proceedings of the Ninth Nordic Workshop on Secure IT Systems, S. Liimatainen and T. Virtanen, Eds., Espoo, Finland, November 2004, pp. 85-90.
-
(2004)
Proceedings of the Ninth Nordic Workshop on Secure IT Systems
, pp. 85-90
-
-
Tóth, G.1
Hornák, Z.2
Vajda, F.3
-
15
-
-
35248849922
-
Modelling unlinkability
-
ser. Lecture Notes in Computer Science, R. Dingledine, Ed., Springer Verlag, Berlin, Dresden, Germany, March 26-28, Revised Papers
-
S. Steinbrecher and S. Köpsell, "Modelling unlinkability," in Privacy Enhancing Technologies, Third International Workshop, PET 2003, Dresden, Germany, March 26-28, 2003, Revised Papers, ser. Lecture Notes in Computer Science, R. Dingledine, Ed., vol.2760. Springer Verlag, Berlin, pp. 32-47.
-
(2003)
Privacy Enhancing Technologies, Third International Workshop, PET 2003
, vol.2760
, pp. 32-47
-
-
Steinbrecher, S.1
Köpsell, S.2
-
16
-
-
35248843604
-
Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions
-
ser. Lecture Notes in Computer Science, E. Biham, Ed., Springer, International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4-8, Proceedings
-
M. Bellare, D. Micciancio, and B. Warinschi, "Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions," in Advances in Cryptology - EUROCRYPT 2003, International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4-8, 2003, Proceedings, ser. Lecture Notes in Computer Science, E. Biham, Ed., vol.2656. Springer, pp. 614-629.
-
(2003)
Advances in Cryptology - EUROCRYPT 2003
, vol.2656
, pp. 614-629
-
-
Bellare, M.1
Micciancio, D.2
Warinschi, B.3
-
17
-
-
84890522850
-
Communication theory of secrecy systems
-
C. E. Shannon, "Communication theory of secrecy systems," Bell System Technical Journal, vol.28, no. 4, pp. 656-715, 1949. [Online]. Available: http://netlab.cs.ucla.edu/wiki/files/shannon1949.pdf
-
(1949)
Bell System Technical Journal
, vol.28
, Issue.4
, pp. 656-715
-
-
Shannon, C.E.1
-
18
-
-
24344501784
-
Measuring anonymity in a non-adaptive, realtime system
-
ser. Lecture Notes in Computer Science, D. Martin and A. Serjantov, Eds., Springer Verlag, Berlin, Toronto, Canada, May 26-28, Revised Selected Papers
-
G. Tóth and Z. Hornák, "Measuring anonymity in a non-adaptive, realtime system," in Privacy Enhancing Technologies, 4th International Workshop, PET 2004, Toronto, Canada, May 26-28, 2004, Revised Selected Papers, ser. Lecture Notes in Computer Science, D. Martin and A. Serjantov, Eds., vol.3424. Springer Verlag, Berlin, pp. 226-241.
-
(2004)
Privacy Enhancing Technologies, 4th International Workshop, PET 2004
, vol.3424
, pp. 226-241
-
-
Tóth, G.1
Hornák, Z.2
-
19
-
-
50249186451
-
Does additional information always decrease anonymity?
-
T. Yu, Ed. ACM Press
-
C. Díaz, C. Troconso, and G. Danezis, "Does additional information always decrease anonymity?" in Proceedings of the 6th ACM Workshop on Privacy in the Electronic Society (WPES'07), T. Yu, Ed. ACM Press, 2007, pp. 72-75.
-
(2007)
Proceedings of the 6th ACM Workshop on Privacy in the Electronic Society (WPES'07)
, pp. 72-75
-
-
Díaz1
Troconso, C.2
Danezis, G.3
-
21
-
-
0003773445
-
A quantitative measure of fairness and discrimination for resource allocation in shared computer systems
-
R. Jain, D. Chiu, and W. Hawe, "A quantitative measure of fairness and discrimination for resource allocation in shared computer systems," DEC, Research Report TR-301, 1984.
-
(1984)
DEC, Research Report TR-301
-
-
Jain, R.1
Chiu, D.2
Hawe, W.3
-
22
-
-
8344222702
-
Fair bandwidth sharing algorithms based on game theory frameworks for wireless ad-hoc networks
-
The 23rd Annual Joint Conference of the IEEE Computer and Communications Societies, Hong Kong, China, March 7-11, IEEE
-
Z. Fang and B. Bensaou, "Fair bandwidth sharing algorithms based on game theory frameworks for wireless ad-hoc networks," in Proceedings of IEEE INFOCOM 2004, The 23rd Annual Joint Conference of the IEEE Computer and Communications Societies, Hong Kong, China, March 7-11, 2004. IEEE, 2004.
-
(2004)
Proceedings of IEEE INFOCOM 2004
-
-
Fang, Z.1
Bensaou, B.2
-
23
-
-
0041973662
-
The impact of multihop wireless channel on TCP throughput and loss
-
IEEE, The 22nd Annual Joint Conference of the IEEE Computer and Communications Societies, San Franciso, CA, USA, March 30, April 3
-
Z. Fu, P. Zerfos, H. Luo, S. Lu, L. Zhang, and M. Gerla, "The impact of multihop wireless channel on TCP throughput and loss," in Proceedings of IEEE INFOCOM 2003, The 22nd Annual Joint Conference of the IEEE Computer and Communications Societies, San Franciso, CA, USA, March 30-April 3, 2003. IEEE, 2003.
-
(2003)
Proceedings of IEEE INFOCOM 2003
-
-
Fu, Z.1
Zerfos, P.2
Luo, H.3
Lu, S.4
Zhang, L.5
Gerla, M.6
-
26
-
-
0022145479
-
Security without identification: Transaction systems to make big brother obsolete
-
D. Chaum, "Security without identification: transaction systems to make big brother obsolete," Communications of the ACM, vol.28, no. 10, pp. 1030-1044, 1985.
-
(1985)
Communications of the ACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum, D.1
-
27
-
-
85032463527
-
Showing credentials without identification: Transferring signatures between unconditionally unlinkable pseudonyms
-
ser. Lecture Notes in Computer Science, J. Seberry and J. Pieprzyk, Eds., Springer Verlag, Berlin
-
"Showing credentials without identification: transferring signatures between unconditionally unlinkable pseudonyms," in Advances in Cryptology - AUSCRYPT 90, ser. Lecture Notes in Computer Science, J. Seberry and J. Pieprzyk, Eds., vol.453. Springer Verlag, Berlin, 1990, pp. 246-264.
-
(1990)
Advances in Cryptology - AUSCRYPT 90
, vol.453
, pp. 246-264
-
-
-
28
-
-
84955571224
-
Access with Pseudonyms
-
Cryptography: Policy and Algorithms
-
L. Chen, "Access with pseudonyms," in Cryptography: Policy and Algorithms, International Conference, Brisbane, Queensland, Australia, July 3-5, 1995, Proceedings, ser. Lecture Notes in in Computer Science, E. Dawson and J. D. Golic, Eds., no. 1029. Springer Verlag, Berlin, 1995, pp. 232-243. (Pubitemid 126030177)
-
(1996)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.1029
, pp. 232-243
-
-
Chen, L.1
-
29
-
-
0019532104
-
UNTRACEABLE ELECTRONIC MAIL, RETURN ADDRESSES, AND DIGITAL PSEUDONYMS.
-
DOI 10.1145/358549.358563
-
D. Chaum, "Untraceable electronic mail, return addresses, and digital pseudonyms," Communications of the ACM, vol.24, no. 2, pp. 84-90, 1981. (Pubitemid 11480996)
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum David, L.1
-
30
-
-
70349233805
-
Revisiting a combinatorial approach toward measuring anonymity
-
Alexandria, Virginia, USA, October, ACM
-
B. Gierlichs, C. Troncoso, C. Díaz, B. Preneel, and I. Verbauwhede, "Revisiting a combinatorial approach toward measuring anonymity," in Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, WPES 2008, Alexandria, Virginia, USA, October 27, 2008. ACM, 2008.
-
(2008)
Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, WPES 2008
-
-
Gierlichs, B.1
Troncoso, C.2
Díaz, C.3
Preneel, B.4
Verbauwhede, I.5
-
32
-
-
84885209870
-
Private social network analysis: How to assemble pieces of a graph privately
-
ACM Press
-
K. B. Frikken and P. Golle, "Private social network analysis: How to assemble pieces of a graph privately," in 2006 Workshop on Privacy in the Electronic Society. ACM Press, 2006, pp. 89-97.
-
(2006)
2006 Workshop on Privacy in the Electronic Society
, pp. 89-97
-
-
Frikken, K.B.1
Golle, P.2
-
33
-
-
84966223713
-
A partition calculus in set theory
-
P. Erdös and R. Rado, "A partition calculus in set theory," Bulletin of the American Mathematical Society, vol.62, no. 5, pp. 427-489, 1956.
-
(1956)
Bulletin of the American Mathematical Society
, vol.62
, Issue.5
, pp. 427-489
-
-
Erdös, P.1
Rado, R.2
|